Free EC0-350 Exam Braindumps (page: 64)

Page 63 of 191

This kind of attack will let you assume a users identity at a dynamically generated web page or site:

  1. SQL Injection
  2. Cross Site Scripting
  3. Session Hijacking
  4. Zone Transfer

Answer(s): B

Explanation:

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Examples of such code include HTML code and client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy.



What would best be defined as a security test on services against a known vulnerability database using an automated tool?

  1. A penetration test
  2. A privacy review
  3. A server audit
  4. A vulnerability assessment

Answer(s): D

Explanation:

Vulnerability assessment is the process of identifying and quantifying vulnerabilities in a system. The system being studied could be a physical facility like a nuclear power plant, a computer system, or a larger system (for example the communications infrastructure or water infrastructure of a region).



Which of the following Netcat commands would be used to perform a UDP scan of the lower 1024 ports?

  1. Netcat -h -U
  2. Netcat -hU <host(s.>
  3. Netcat -sU -p 1-1024 <host(s.>
  4. Netcat -u -v -w2 <host> 1-1024
  5. Netcat -sS -O target/1024

Answer(s): D

Explanation:

The proper syntax for a UDP scan using Netcat is "Netcat -u -v -w2 <host> 1-1024". Netcat is considered the Swiss-army knife of hacking tools because it is so versatile.



What port number is used by Kerberos protocol?

  1. 44
  2. 88
  3. 419
  4. 487

Answer(s): B

Explanation:

Kerberos traffic uses UDP/TCP protocol source and destination port 88.






Post your Comments and Discuss EC-Council EC0-350 exam with other Community members:

EC0-350 Exam Discussions & Posts